From eaf06481c21fed0f3e8db85f5ebb7344fb8b7292 Mon Sep 17 00:00:00 2001 From: erjohnson Date: Mon, 9 Dec 2019 12:45:34 -0800 Subject: [PATCH 1/3] Update app saml addon instructions --- .../saml/saml-apps/_configure-saml-addon.md | 7 +++++ articles/protocols/saml/saml-apps/_header.md | 5 ---- .../protocols/saml/saml-apps/cisco-webex.md | 15 ++++++++-- articles/protocols/saml/saml-apps/datadog.md | 19 ++++++++---- articles/protocols/saml/saml-apps/egencia.md | 16 ++++++---- articles/protocols/saml/saml-apps/eloqua.md | 16 ++++++---- .../protocols/saml/saml-apps/freshdesk.md | 19 ++++++++---- .../protocols/saml/saml-apps/github-cloud.md | 3 +- .../protocols/saml/saml-apps/google-apps.md | 16 +++++++--- .../saml/saml-apps/hosted-graphite.md | 17 +++++++---- articles/protocols/saml/saml-apps/litmos.md | 30 +++++++++++++++---- .../protocols/saml/saml-apps/pluralsight.md | 18 +++++++---- .../protocols/saml/saml-apps/sprout-video.md | 16 +++++++--- .../saml/saml-apps/tableau-online.md | 19 ++++++++---- .../saml/saml-apps/tableau-server.md | 19 ++++++++---- articles/protocols/saml/saml-apps/workday.md | 16 +++++++--- articles/protocols/saml/saml-apps/workpath.md | 21 +++++++++---- 17 files changed, 196 insertions(+), 76 deletions(-) create mode 100644 articles/protocols/saml/saml-apps/_configure-saml-addon.md delete mode 100644 articles/protocols/saml/saml-apps/_header.md diff --git a/articles/protocols/saml/saml-apps/_configure-saml-addon.md b/articles/protocols/saml/saml-apps/_configure-saml-addon.md new file mode 100644 index 0000000000..5e5fd4d5db --- /dev/null +++ b/articles/protocols/saml/saml-apps/_configure-saml-addon.md @@ -0,0 +1,7 @@ +## Configure the SAML2 Web App addon + +1. Login to [Auth0 dashboard](${manage_url}) and create a new [Application](${manage_url}/#/applications). +2. Give the new application a meaningful name, like "${saml_app_name}". For this tutorial we'll chooose the "Regular Web App" type, but you can choose any of them. +3. Navigate to the [Addons](${manage_url}/#/applications/${account.clientId}/addons) tab. +4. Enable the **SAML2 Web App** addon using the toggle switch. +5. In the **Settings** window, set the following values: diff --git a/articles/protocols/saml/saml-apps/_header.md b/articles/protocols/saml/saml-apps/_header.md deleted file mode 100644 index d3708bc803..0000000000 --- a/articles/protocols/saml/saml-apps/_header.md +++ /dev/null @@ -1,5 +0,0 @@ -# ${meta.title} - -## SAML Configuration - -Use the following SAML configuration: diff --git a/articles/protocols/saml/saml-apps/cisco-webex.md b/articles/protocols/saml/saml-apps/cisco-webex.md index 4c32cef3d7..1160d3c8be 100644 --- a/articles/protocols/saml/saml-apps/cisco-webex.md +++ b/articles/protocols/saml/saml-apps/cisco-webex.md @@ -1,18 +1,27 @@ --- -title: Cisco WebEx SAML Configuration -description: Cisco WebEx SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Cisco WebEx +description: Learn how to configure Auth0 to be a SAML Identity Provider for a Cisco WebEx. topics: - saml - identity-providers - cisco - cisco-webex + - webex contentType: - how-to useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Cisco WebEx + +On this page, you'll find steps on configuring Auth0 to serve as a SAML Identity Provider for [Cisco WebEx](https://www.webex.com/). + +<%= include('./_configure-saml-addon.md', { + saml_app_name: "CiscoWebEx" +}) %> + +- **Settings (JSON):** ```json { diff --git a/articles/protocols/saml/saml-apps/datadog.md b/articles/protocols/saml/saml-apps/datadog.md index 45b50ab027..0f2861731c 100644 --- a/articles/protocols/saml/saml-apps/datadog.md +++ b/articles/protocols/saml/saml-apps/datadog.md @@ -1,6 +1,6 @@ --- -title: Datadog SAML Configuration -description: Datadog SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Datadog +description: Learn how to configure Auth0 to be a SAML Identity Provider for a Datadog. topics: - saml - identity-providers @@ -11,7 +11,16 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Datadog + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Datadog](https://www.datadoghq.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Datadog" +}) %> + +- **Application Callback URL:** `https://app.datadoghq.com/account/saml/assertion` +- **Settings (JSON):** ```json { @@ -29,6 +38,4 @@ useCase: } ``` -The **Callback URL** is `https://app.datadoghq.com/account/saml/assertion`. - -Notice that Datadog has an option to automatically provision new users. Check [Datadog docs](http://docs.datadoghq.com/guides/saml/) for more details. +Datadog has an option to automatically provision new users. Check out [Datadog docs](http://docs.datadoghq.com/guides/saml/) for more details. diff --git a/articles/protocols/saml/saml-apps/egencia.md b/articles/protocols/saml/saml-apps/egencia.md index 6fbc053c54..84186764d1 100644 --- a/articles/protocols/saml/saml-apps/egencia.md +++ b/articles/protocols/saml/saml-apps/egencia.md @@ -1,6 +1,6 @@ --- -title: Egencia SAML Configuration -description: Egencia SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Egencia +description: Learn how to configure Auth0 to be a SAML Identity Provider for Egencia. topics: - saml - identity-providers @@ -11,8 +11,16 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Egencia +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Egencia](https://www.egencia.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Egencia" +}) %> + +- **Application Callback URL:** `https://www.egencia.com/auth/v1/artifactConsumer` +- **Settings (JSON):** ```json { @@ -29,5 +37,3 @@ useCase: ], } ``` - -The **Callback URL** is `https://www.egencia.com/auth/v1/artifactConsumer`. diff --git a/articles/protocols/saml/saml-apps/eloqua.md b/articles/protocols/saml/saml-apps/eloqua.md index cabc886eb5..0127fecfcf 100644 --- a/articles/protocols/saml/saml-apps/eloqua.md +++ b/articles/protocols/saml/saml-apps/eloqua.md @@ -1,6 +1,6 @@ --- -title: Eloqua (Oracle Eloqua Marketing Cloud) SAML Configuration -description: Eloqua (Oracle Eloqua Marketing Cloud) SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Eloqua +description: Learn how to configure Auth0 to be a SAML Identity Provider for Eloqua (Oracle Eloqua Marketing Cloud). topics: - saml - identity-providers @@ -11,8 +11,16 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Eloqua +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Eloqua (Oracle Eloqua Marketing Cloud)](). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Eloqua" +}) %> + +- **Application Callback URL:** `https://login.eloqua.com/auth/saml2/acs` +- **Settings (JSON):** ```json { @@ -32,8 +40,6 @@ useCase: ``` -The **Callback URL** is `https://login.eloqua.com/auth/saml2/acs`. - ::: note The Service Provider Entity URL copied from within the IDP settings in Eloqua to set the audience restriction within Auth0. ::: \ No newline at end of file diff --git a/articles/protocols/saml/saml-apps/freshdesk.md b/articles/protocols/saml/saml-apps/freshdesk.md index 3a4dcb66b4..ea7fa5696d 100644 --- a/articles/protocols/saml/saml-apps/freshdesk.md +++ b/articles/protocols/saml/saml-apps/freshdesk.md @@ -1,6 +1,6 @@ --- -title: Freshdesk SAML Configuration -description: Freshdesk SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Freshdesk +description: Learn how to configure Auth0 to be a SAML Identity Provider for Freshdesk. topics: - saml - identity-providers @@ -11,11 +11,20 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Freshdesk + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Freshdesk](https://freshdesk.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Freshdesk" +}) %> + +- **Application Callback URL:** `https://.freshdesk.com/login/saml` +- **Settings (JSON):** ```json { - "audience": "https://{FD Domain}.freshdesk.com", + "audience": "https://.freshdesk.com", "mappings": { "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", "given_name": "User.FirstName", @@ -31,5 +40,3 @@ useCase: ] } ``` - -The **Callback URL** is `https://{FD Domain}.freshdesk.com/login/saml`. diff --git a/articles/protocols/saml/saml-apps/github-cloud.md b/articles/protocols/saml/saml-apps/github-cloud.md index fdd173f9e9..22f6520b59 100644 --- a/articles/protocols/saml/saml-apps/github-cloud.md +++ b/articles/protocols/saml/saml-apps/github-cloud.md @@ -1,6 +1,6 @@ --- title: Configure Auth0 as Identity Provider for GitHub Enterprise Cloud -description: This page explains how to configure Auth0 to be the SAML Identity Provider for a GitHub Enterprise Cloud (github.com) organization. +description: Learn how to configure Auth0 to be the SAML Identity Provider for a GitHub Enterprise Cloud (github.com) organization. topics: - saml - identity-providers @@ -72,6 +72,7 @@ As an example, if you want `nickname` as the Name Identifier, the `mappings` sec ``` ## Configure SAML Single Sign-On on GitHub + Follow the instruction from GitHub's [Enabling and testing SAML Single Sign-on (SSO) for your organization](https://help.github.com/en/articles/enabling-and-testing-saml-single-sign-on-for-your-organization) to complete the configuration on GitHub Enterprise Cloud. You will need the following information: * **Sign On URL** (for step 6): `https://${account.namespace}/samlp/{CLIENT_ID}` diff --git a/articles/protocols/saml/saml-apps/google-apps.md b/articles/protocols/saml/saml-apps/google-apps.md index 1bb7255078..e2e6600f21 100644 --- a/articles/protocols/saml/saml-apps/google-apps.md +++ b/articles/protocols/saml/saml-apps/google-apps.md @@ -1,6 +1,6 @@ --- -title: G Suite SAML Configuration -description: G Suite SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for G Suite +description: Learn how to configure Auth0 to be a SAML Identity Provider for G Suite. topics: - saml - identity-providers @@ -11,7 +11,16 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for G Suite + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [G Suite](https://gsuite.google.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "GSuite" +}) %> + +- **Application Callback URL:** `https://www.google.com/a/{YOUR-GOOGLE-DOMAIN}/acs` +- **Settings (JSON):** ```json { @@ -32,4 +41,3 @@ useCase: } ``` -The **Callback URL** is `https://www.google.com/a/{YOUR-GOOGLE-DOMAIN}/acs`. diff --git a/articles/protocols/saml/saml-apps/hosted-graphite.md b/articles/protocols/saml/saml-apps/hosted-graphite.md index cbeb6da827..122c3d236d 100644 --- a/articles/protocols/saml/saml-apps/hosted-graphite.md +++ b/articles/protocols/saml/saml-apps/hosted-graphite.md @@ -1,6 +1,6 @@ --- -title: Hosted Graphite SAML Configuration -description: Hosted Graphite SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Hosted Graphite +description: Learn how to configure Auth0 to be a SAML Identity Provider for Hosted Graphite. topics: - saml - identity-providers @@ -11,7 +11,16 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Hosted Graphite + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Hosted Graphite](https://www.hostedgraphite.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "HostedGraphite" +}) %> + +- **Application Callback URL:** `https://www.hostedgraphite.com/complete/saml//` +- **Settings (JSON):** ```json { @@ -22,5 +31,3 @@ useCase: ] } ``` - -The **Callback URL** is `https://www.hostedgraphite.com/complete/saml/{YOUR-USER-ID}/`. diff --git a/articles/protocols/saml/saml-apps/litmos.md b/articles/protocols/saml/saml-apps/litmos.md index 756f9ca3b4..1df737b7b8 100644 --- a/articles/protocols/saml/saml-apps/litmos.md +++ b/articles/protocols/saml/saml-apps/litmos.md @@ -10,8 +10,30 @@ contentType: useCase: - add-idp --- - -<%= include('./_header') %> + +--- +title: Configure Auth0 as a SAML Identity Provider for Litmos +description: Learn how to configure Auth0 to be a SAML Identity Provider for Litmos. +topics: + - saml + - identity-providers + - litmos +contentType: + - how-to +useCase: + - add-idp +--- + +# Configure Auth0 as a SAML Identity Provider for Litmos + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Litmos](https://www.litmos.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Litmos" +}) %> + +- **Application Callback URL:** `https://.litmos.com/integration/samllogin` +- **Settings (JSON):** ```json { @@ -27,7 +49,7 @@ useCase: "mapIdentities": false, "signatureAlgorithm": "rsa-sha1", "digestAlgorithm": "sha1", - "destination": "https://{YOUR DOMAIN}.litmos.com/integration/samllogin", + "destination": "https://.litmos.com/integration/samllogin", "lifetimeInSeconds": 3600, "signResponse": false, "nameIdentifierFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", @@ -37,8 +59,6 @@ useCase: } ``` -The **Callback URL** is `https://{YOUR DOMAIN}.litmos.com/integration/samllogin`. - ## Sample SAML ```xml diff --git a/articles/protocols/saml/saml-apps/pluralsight.md b/articles/protocols/saml/saml-apps/pluralsight.md index ea769d56c2..16b786b8f3 100644 --- a/articles/protocols/saml/saml-apps/pluralsight.md +++ b/articles/protocols/saml/saml-apps/pluralsight.md @@ -1,18 +1,26 @@ --- -title: Pluralsight SAML Configuration -description: Pluralsight SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Pluralsight +description: Learn how to configure Auth0 to be a SAML Identity Provider for Pluralsight. topics: - saml - identity-providers - - pluralsight + - Pluralsight contentType: - how-to useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Pluralsight +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Pluralsight](https://www.pluralsight.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Pluralsight" +}) %> + +- **Application Callback URL:** `https://prod-pf.pluralsight.com/sp/ACS.saml2` +- **Settings (JSON):** ```json { @@ -33,5 +41,3 @@ useCase: ] } ``` - -The **Callback URL** is `https://prod-pf.pluralsight.com/sp/ACS.saml2`. diff --git a/articles/protocols/saml/saml-apps/sprout-video.md b/articles/protocols/saml/saml-apps/sprout-video.md index fd4ada302c..581e7285bc 100644 --- a/articles/protocols/saml/saml-apps/sprout-video.md +++ b/articles/protocols/saml/saml-apps/sprout-video.md @@ -1,6 +1,6 @@ --- -title: Sprout Video SAML Configuration -description: Sprout Video SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Sprout Video +description: Learn how to configure Auth0 to be a SAML Identity Provider for Sprout Video. topics: - saml - identity-providers @@ -11,11 +11,19 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Sprout Video + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Sprout Video](https://sproutvideo.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "SproutVideo" +}) %> + +- **Settings (JSON):** ```json { - "audience": "https://{YOUR SPROUT VIDEO ACCOUNT}.vids.io", + "audience": "https://{YOUR_SPROUT_VIDEO_ACCOUNT}.vids.io", "mappings": { "user_id": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier", "email": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress", diff --git a/articles/protocols/saml/saml-apps/tableau-online.md b/articles/protocols/saml/saml-apps/tableau-online.md index 292d00c54b..118e0bd760 100644 --- a/articles/protocols/saml/saml-apps/tableau-online.md +++ b/articles/protocols/saml/saml-apps/tableau-online.md @@ -1,17 +1,26 @@ --- -title: Tableau Online SAML Configuration -description: Tableau Online SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Tableau Online +description: Learn how to configure Auth0 to be a SAML Identity Provider for Tableau Online. topics: - saml - identity-providers - - tableau + - tableau-online contentType: - how-to useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Tableau Online + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Tableau Online](https://online.tableau.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "TableauOnline" +}) %> + +- **Application Callback URL:** `https://sso.online.tableau.com/public/sp/SSO?alias=` +- **Settings (JSON):** ```json { @@ -36,6 +45,4 @@ useCase: } ``` -The **Callback URL** is `https://sso.online.tableau.com/public/sp/SSO?alias={YOUR TABLEAU ALIAS}`. - See [https://onlinehelp.tableau.com/current/online/en-us/saml_config_site.htm](https://onlinehelp.tableau.com/current/online/en-us/saml_config_site.htm) for more information. diff --git a/articles/protocols/saml/saml-apps/tableau-server.md b/articles/protocols/saml/saml-apps/tableau-server.md index e299a22d92..971d430170 100644 --- a/articles/protocols/saml/saml-apps/tableau-server.md +++ b/articles/protocols/saml/saml-apps/tableau-server.md @@ -1,17 +1,26 @@ --- -title: Tableau Server SAML Configuration -description: Tableau Server SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Tableau Server +description: Learn how to configure Auth0 to be a SAML Identity Provider for Tableau Server. topics: - saml - identity-providers - - tableau + - tableau-server contentType: - how-to useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Tableau Server + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Tableau Server](https://www.tableau.com/products/server). + +<%= include('./_configure-saml-addon', { + saml_app_name: "TableauServer" +}) %> + +- **Application Callback URL:** `http://{YOUR_TABLEAU_SERVER}/wg/saml/SSO/index.html` +- **Settings (JSON):** ```json { @@ -35,5 +44,3 @@ useCase: ] } ``` - -The **Callback URL** is `http://{YOUR TABLEAU SERVER}/wg/saml/SSO/index.html`. diff --git a/articles/protocols/saml/saml-apps/workday.md b/articles/protocols/saml/saml-apps/workday.md index 1e3f3f6970..8f7c276ada 100644 --- a/articles/protocols/saml/saml-apps/workday.md +++ b/articles/protocols/saml/saml-apps/workday.md @@ -1,6 +1,6 @@ --- -title: Workday SAML Configuration -description: Workday SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Workday +description: Learn how to configure Auth0 to be a SAML Identity Provider for Workday. topics: - saml - identity-providers @@ -11,7 +11,16 @@ useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Workday + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Workday](https://www.workday.com/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Workday" +}) %> + +- **Application Callback URL:** `https://impl.workday.com//login-saml.htmld`. You may want to change the subdomain `impl` depending on the Workday data center you are using. +- **Settings (JSON):** ```json { @@ -32,4 +41,3 @@ useCase: } ``` -The **Callback URL** is `https://impl.workday.com//login-saml.htmld`. You may want to change the subdomain `impl` depending on the Workday data center you are using. diff --git a/articles/protocols/saml/saml-apps/workpath.md b/articles/protocols/saml/saml-apps/workpath.md index 60e2f170b2..01cc979435 100644 --- a/articles/protocols/saml/saml-apps/workpath.md +++ b/articles/protocols/saml/saml-apps/workpath.md @@ -1,13 +1,26 @@ --- -title: Workpath SAML Configuration -description: Workpath SAML Configuration +title: Configure Auth0 as a SAML Identity Provider for Workpath +description: Learn how to configure Auth0 to be a SAML Identity Provider for Workpath. +topics: + - saml + - identity-providers + - workpath contentType: - how-to useCase: - add-idp --- -<%= include('./_header') %> +# Configure Auth0 as a SAML Identity Provider for Workpath + +On this page, you'll find steps on configuring Auth0 as a SAML Identity Provider for [Workpath](https://www.workpath.co/). + +<%= include('./_configure-saml-addon', { + saml_app_name: "Workpath" +}) %> + +- **Application Callback URL:** `https://api.workpath.com/v1/saml/assert/{YOUR-WORKPATH-SUBDOMAIN}` +- **Settings (JSON):** ```json { @@ -19,5 +32,3 @@ useCase: } } ``` - -The **Callback URL** is `https://api.workpath.com/v1/saml/assert/{YOUR-WORKPATH-SUBDOMAIN}`. From cc9519a86331b7e63d21c5654fcd9b1c27f38a0d Mon Sep 17 00:00:00 2001 From: erjohnson Date: Tue, 10 Dec 2019 08:45:36 -0800 Subject: [PATCH 2/3] Update litmos frontmatter --- articles/protocols/saml/saml-apps/litmos.md | 13 ------------- 1 file changed, 13 deletions(-) diff --git a/articles/protocols/saml/saml-apps/litmos.md b/articles/protocols/saml/saml-apps/litmos.md index 1df737b7b8..fc5c0a6874 100644 --- a/articles/protocols/saml/saml-apps/litmos.md +++ b/articles/protocols/saml/saml-apps/litmos.md @@ -1,16 +1,3 @@ ---- -title: Litmos SAML Configuration -description: Litmos SAML Configuration -topics: - - saml - - identity-providers - - litmos -contentType: - - how-to -useCase: - - add-idp ---- - --- title: Configure Auth0 as a SAML Identity Provider for Litmos description: Learn how to configure Auth0 to be a SAML Identity Provider for Litmos. From e52e7aa91ee021a9a7dd1eae521c3cd1d66bb7fc Mon Sep 17 00:00:00 2001 From: Eric Date: Thu, 12 Dec 2019 14:54:43 -0800 Subject: [PATCH 3/3] Remove broken link --- articles/protocols/saml/saml-apps/_configure-saml-addon.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/articles/protocols/saml/saml-apps/_configure-saml-addon.md b/articles/protocols/saml/saml-apps/_configure-saml-addon.md index 5e5fd4d5db..70fc547434 100644 --- a/articles/protocols/saml/saml-apps/_configure-saml-addon.md +++ b/articles/protocols/saml/saml-apps/_configure-saml-addon.md @@ -2,6 +2,6 @@ 1. Login to [Auth0 dashboard](${manage_url}) and create a new [Application](${manage_url}/#/applications). 2. Give the new application a meaningful name, like "${saml_app_name}". For this tutorial we'll chooose the "Regular Web App" type, but you can choose any of them. -3. Navigate to the [Addons](${manage_url}/#/applications/${account.clientId}/addons) tab. +3. Navigate to the **Addons** tab. 4. Enable the **SAML2 Web App** addon using the toggle switch. 5. In the **Settings** window, set the following values: